Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Brian Witten is active.

Publication


Featured researches published by Brian Witten.


Malware Detection | 2007

Malware Evolution: A Snapshot of Threats and Countermeasures in 2005

Brian Witten; Carey Nachenberg

Speed, stealth, and purpose of malware [1] threats and countermeasures are evolving quickly. This chapter describes these three facets of current malware threats, and describes a few countermeasures emerging to better address such threats.


annual computer security applications conference | 2006

Engineering Sufficiently Secure Computing

Brian Witten

We propose an architecture of four complimentary technologies increasingly relevant to a growing number of home users and organizations: cryptography, separation kernels, formal verification, and rapidly improving techniques relevant to software defect density estimation. Cryptographic separation protects information in transmission and storage. Formally proven properties of separation kernel based secure virtualization can bound risk for information in processing. Then, within each strongly separated domain, risk can be measured as a function of people and technology within that domain. Where hardware, software, and their interactions are proven to behave as and only as desired under all circumstances, such hardware and software can be considered to not substantially increase risk. Where the size or complexity of software is beyond such formal proofs, we discuss estimating risk related to software defect densities, and emerging work related to binary analysis with potential for improving software defect density estimation.


Archive | 2008

Systems and methods for securely managing access to data

Denis Serenyi; Brian Witten


Archive | 2008

Method and apparatus for identifying invariants to detect software tampering

Brian Witten; Matthew C. Elder


Archive | 2009

Viewing content under enterprise digital rights management without a client side access component

Robert Koeten; Brian Witten


Archive | 2010

Systems and methods for using virtualization to implement information rights management

Michael Spertus; Denis Serenyi; Brian Witten


international workshop on peer to peer systems | 2008

RapidUpdate: peer-assisted distribution of security content

Denis Serenyi; Brian Witten


Archive | 2006

Adaptive liveness management for robust and efficient peer-to-peer storage

Alfred C. Hartmann; Brian Witten; Slava Kritov


Archive | 2015

Systems and methods for authenticating an application

Jonathon Salehpour; Brian Witten; Bruce McCorkendale


Archive | 2009

A Logical Representation of Common Rules for Controlling Access to Classified Information

Deepak Garg; Denis Serenyi; Frank Pfenning; Brian Witten

Collaboration


Dive into the Brian Witten's collaboration.

Top Co-Authors

Avatar

Frank Pfenning

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Deepak Garg

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar

Lujo Bauer

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge